
In this article…
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus at nisl nunc. Sed et nunc a erat vestibulum faucibus. Sed fermentum placerat mi aliquet vulputate. In hac habitasse platea dictumst. Maecenas ante dolor, venenatis vitae neque pulvinar, gravida gravida quam. Phasellus tempor rhoncus ante, ac viverra justo scelerisque at. Sed sollicitudin elit vitae est lobortis luctus. Mauris vel ex at metus cursus vestibulum lobortis cursus quam. Donec egestas cursus ex quis molestie. Mauris vel porttitor sapien. Curabitur tempor velit nulla, in tempor enim lacinia vitae. Sed cursus nunc nec auctor aliquam. Morbi fermentum, nisl nec pulvinar dapibus, lectus justo commodo lectus, eu interdum dolor metus et risus. Vivamus bibendum dolor tellus, ut efficitur nibh porttitor nec.
Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Maecenas facilisis pellentesque urna, et porta risus ornare id. Morbi augue sem, finibus quis turpis vitae, lobortis malesuada erat. Nullam vehicula rutrum urna et rutrum. Mauris convallis ac quam eget ornare. Nunc pellentesque risus dapibus nibh auctor tempor. Nulla neque tortor, feugiat in aliquet eget, tempus eget justo. Praesent vehicula aliquet tellus, ac bibendum tortor ullamcorper sit amet. Pellentesque tempus lacus eget aliquet euismod. Nam quis sapien metus. Nam eu interdum orci. Sed consequat, lectus quis interdum placerat, purus leo venenatis mi, ut ullamcorper dui lorem sit amet nunc. Donec semper suscipit quam eu blandit. Sed quis maximus metus. Nullam efficitur efficitur viverra. Curabitur egestas eu arcu in cursus.
H1
H2
H3
H4
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum dapibus ullamcorper ex, sed congue massa. Duis at fringilla nisi. Aenean eu nibh vitae quam auctor ultrices. Donec consequat mattis viverra. Morbi sed egestas ante. Vivamus ornare nulla sapien. Integer mollis semper egestas. Cras vehicula erat eu ligula commodo vestibulum. Fusce at pulvinar urna, ut iaculis eros. Pellentesque volutpat leo non dui aliquet, sagittis auctor tellus accumsan. Curabitur nibh mauris, placerat sed pulvinar in, ullamcorper non nunc. Praesent id imperdiet lorem.
H5
Curabitur id purus est. Fusce porttitor tortor ut ante volutpat egestas. Quisque imperdiet lobortis justo, ac vulputate eros imperdiet ut. Phasellus erat urna, pulvinar id turpis sit amet, aliquet dictum metus. Fusce et dapibus ipsum, at lacinia purus. Vestibulum euismod lectus quis ex porta, eget elementum elit fermentum. Sed semper convallis urna, at ultrices nibh euismod eu. Cras ultrices sem quis arcu fermentum viverra. Nullam hendrerit venenatis orci, id dictum leo elementum et. Sed mattis facilisis lectus ac laoreet. Nam a turpis mattis, egestas augue eu, faucibus ex. Integer pulvinar ut risus id auctor. Sed in mauris convallis, interdum mi non, sodales lorem. Praesent dignissim libero ligula, eu mattis nibh convallis a. Nunc pulvinar venenatis leo, ac rhoncus eros euismod sed. Quisque vulputate faucibus elit, vitae varius arcu congue et.
Ut convallis cursus dictum. In hac habitasse platea dictumst. Ut eleifend eget erat vitae tempor. Nam tempus pulvinar dui, ac auctor augue pharetra nec. Sed magna augue, interdum a gravida ac, lacinia quis erat. Pellentesque fermentum in enim at tempor. Proin suscipit, odio ut lobortis semper, est dolor maximus elit, ac fringilla lorem ex eu mauris.
- Phasellus vitae elit et dui fermentum ornare. Vestibulum non odio nec nulla accumsan feugiat nec eu nibh. Cras tincidunt sem sed lacinia mollis. Vivamus augue justo, placerat vel euismod vitae, feugiat at sapien. Maecenas sed blandit dolor. Maecenas vel mauris arcu. Morbi id ligula congue, feugiat nisl nec, vulputate purus. Nunc nec aliquet tortor. Maecenas interdum lectus a hendrerit tristique. Ut sit amet feugiat velit.
- Test
- Yes

Risk managers, legal experts and brokers say phishing and social engineering are, by far, the biggest security threats facing their companies and clients. In fact, 80 percent of legal experts polled by Advisen for Experian Data Breach Resolution’s 2017 Cyber Risk Preparedness and Response Survey, 68 percent of brokers and 61 percent of risk managers cited phishing/social engineering as their top concern. Why do they feel that way? A look at the numbers and some insight into human nature can explain their fears — and help you understand why your organization should be just as concerned about phishing risks. By the numbers Phishing and social engineering are particularly effective forms of cyberattack because they use technology and knowledge of human nature to manipulate employees into actions that serve the attacker’s purpose. How effective are they? Employees succumbing to a targeted phishing attack was one of the top two insider risks cited by executives who responded to the Ponemon report Managing Insider Risk through Training and Culture. Sixty-one percent of information security professionals polled by Wombat Security for its 2017 State of the Phish report said their organization had been the victim of a phishing attack. According to the Ponemon Fourth Annual Preparedness Study, 38 percent of respondents are not confident they can deal with a spear phishing incident The human risk factor Phishing in general and spear phishing in particular are successful because human beings are often the chink in an organization’s cybersecurity armor. All it takes is one overly curious and under-cautious employee clicking on a suspicious email, or a well-meaning worker who responds to a seemingly authentic request for proprietary information. Those scenarios are the stuff of nightmares for information security professionals, and unfortunately they happen all too frequently. Multiple studies show that negligent employees cause more data breaches than other sources, whether they succumb to a phishing attack or lose a company laptop at the airport. However, studies also show that cybersecurity training, including a component on phishing, can help reduce employee-related risks. Training is critical Among organizations that train employees on how to spot and avoid phishing attacks, 52 percent reported they were able to see quantifiable results — fewer successful attacks — based on their training, Wombat said. Respondents to the Advisen survey stressed the importance of creating a company culture in which cybersecurity is everyone’s job and knowledge of phishing and how to thwart attacks is the norm. Employee training in cybersecurity should begin as part of the onboarding process when the worker joins your organization, and everyone should get a refresher at least annually. While 67 percent of those surveyed by Ponemon said their organizations didn’t incentivize employees to proactively protect sensitive information or report potential issues, any successful culture of security should reward those who are embracing their roles as protectors — and not just punish those who fall short. Learn more about our Data Breach solutions

The 1990s brought us a wealth of innovative technology, including the Blackberry, Windows 98, and Nintendo. As much as we loved those inventions, we moved on to enjoy better technology when it became available, and now have smartphones, Windows 10 and Xbox. Similarly, technological and modeling advances have been made in the credit scoring arena, with new software that brings significant benefits to lenders who use them. Later this year, FICO will retire its Score V1, making it mandatory for those lenders still using the old software to find another solution. Now is the time for lenders to take a look at their software and myriad reasons to move to a modern credit score solution. Portfolio Growth As many as 70 million Americans either have no credit score or a thin credit file. One-third of Millennials have never bothered to apply for a credit card, and the percentage of Americans under 35 with credit card debt is at its lowest level in more than 25 years, according to the Federal Reserve. A recent study found that Millennials use cash and debit cards much more than older Americans. Over time, Millennials without credit histories could struggle to get credit. Are there other data sets that provide a window into whether a thin file consumer is creditworthy or not? Modern credit scoring models are now being used in the marketplace without negatively impacting credit quality. For example, the VantageScore® credit score allows for the scoring of 30 million to 35 million more people consumers who are typically unscoreable by other traditional generic credit models. The VantageScore® credit score does this by using a broader, deeper set of credit file data and more advanced modeling techniques. This allows the VantageScore® credit score model to more accurately predict unique consumer behaviors—is the consumer paying his utility bill on time?—and better evaluate thin file consumers. Mitigate Risk In today’s ever-changing regulatory landscape, lenders can stay ahead of the curve by relying on innovative credit score models like the VantageScore® credit score. These models incorporate the best of both worlds by leaning on innovative scoring analytics that are more inclusive, while providing marketplace lenders with assurances the decisioning is both statistically sound and compliant with fair lending laws. Newer solutions also offer enhanced documentation to ease the burden associated with model risk management and regulatory compliance responsibilities. Updated scores Consumer credit scores can vary depending on the type of scoring model a lender uses. If it's an old, outdated version, a consumer might be scored lower. If it's a newer, more advanced model, the consumer has a better shot at being scored more fairly. Moving to a more advanced scoring model can help broaden the base of potential borrowers. By sticking to old models—and older scores—a sizable number of consumers are left at a disadvantage in the form of a higher interest rate, lower loan amount or even a declined application. Introducing advanced scoring models can provide a more accurate picture of a consumer. As an example, for many of the newest consumer risk models, like FICO Score 9, a consumer’s unpaid medical collection agency accounts will be assessed differently from unpaid non-medical collection agency accounts. This isn't true for most pre-2012 consumer risk score versions. Each version contains different nuances for increasing your score, and it’s important to understand what they are. Upgrading your credit score to the latest VantageScore® credit score or FICO solution is easier than you think, with a switch to a modern solution taking no longer than eight weeks and your current business processes still in place. Are you ready to reap the rewards of modern credit scoring?

Identity theft is frustrating. Not just for people, but for businesses too. According to our recent survey, many Americans are unknowingly engaging in risky behaviors online. Some of the insights that cause concern include: U.S. adults have large digital footprints, storing an average of 3.4 types of personally identifiable information (PII) online. Half don’t think they’re likely to ever experience identity theft because they believe poor credit makes them unappealing targets. A quarter have shared their credit card number or PIN with friends and family. When fraudsters capture your customers’ PII, it impacts them as well as your business. That’s just one of many reasons why you should be helping your customers protect their information. PII security tips for your customers >


